Microsoft Remote Desktop on Apple mac OSX and Windows 2012 – How to fix & get updated software

Watch out – the old OS X Microsoft Remote Desktop (version 2.1.1) that comes with Mac Microsoft Office 2011 no longer works with Windows 2012 R2 (it does work with plain old Windows 2012). For me it fails with the following error message:

Remote Desktop Connection cannot verify the identity of the computer that you want to connect to.

A (regular) Windows 2012 Remote Desktop client doesn’t have this problem.

(Brief aside – Microsoft have a little note that says the 2.1.1 client is not supported on OS X v10.7 or later. Who knew and why did it make me report all those crashes?)

The good news is that the new OS X Microsoft Remote Desktop 8.0.24091 (Mac App store only though – grr) does work with Windows 2012 R2 . Why this information isn’t listed on the What’s New in 2012 R2 Remote Services page I don’t know…

Another alternative is a product called CoRD – Home Page of CoRD

How to Block Porn on iOS 7 for iPhone, iPad & iPod Touch – Adult Filter

Business’, Parents and users looking to block porn on the iPhone and iPad should be first in line to update to iOS 7.

Apple includes enhanced parental controls on iOS 7 including an iPad and iPhone porn block feature that can restrict the ability of users to access websites with adult material.

Like any internet filter, this iPhone porn block feature isn’t going to be perfect, but in our tests the iOS 7 porn filter did a good job of preventing access to questionable websites.

This is a free feature in iOS 7 and it is at the system level so it can block porn and other adult themed websites throughout the device without requiring the user to use a specific browser.

The iPhone porn block feature is new in iOS 7.

The iPhone porn block feature is new in iOS 7.

In our testing, the iPhone porn block mode even carries over to Google Chrome on the iPhone, so kids and users can’t just download a new browser to get around this.

First off you will need to update to iOS 7 to use the Adult Web Filtering feature. This is a new feature in iOS 7, and it is a free update.

When you have iOS 7 installed the following steps will get you to the point where you can block adult material on the iPhone and iPad.

Settings -> General -> Enable Restrictions -> Websites -> Limit Adult Content

This will prompt you to enter a pass code, and you should make it one that is different from the user’s unlock code, or they can turn it on and off at will. When prompted create a secret code that the user will not know.

Parental controls in iOS 7 let users block porn on the iPhone, iPad and iPod touch.

Parental controls in iOS 7 let users block porn on the iPhone, iPad and iPod touch.

To turn off the iPhone porn blocking feature in iOS 7, enter the pass code and turn restrictions off. If the pass code is locked you may need to reset the iPhone, iPad or iPod touch.

Because no Internet filter is perfect, the parent or administrator can manually block and allow certain websites always. Enter these in the settings menu, or enter the pass code when browsing to add an attempted address to the list.

Thank you: Source
Read more at http://www.gottabemobile.com

Sophisticated Apple ID phishing email “Update your Apple ID account”

Apple ID account holders targeted by double chance phishing email

Apple ID account holders need to be cautious of a sophisticated phishing camping targeting your Apple ID, personal information and credit card details.

REMEMBER: You will have an Apple ID if you have registered to use iTunes or many other Apple products. You don’t need to own an Apple iPhone or Mac to have an Apple ID.

The phishing email looks official and currently includes the subject line “Update your Apple ID account”. Other known subject lines include: “Please update your Apple ID”, “Please verify the email address associated [sic] with your Apple ID”, and “Your Apple ID has been Disabled for Security Reasons”.
Similar versions could also reference iTunes.

The email includes a link which, when clicked, takes you to a fake, but realistic looking Apple website asking you to sign in to your account.

 

An example of the phishing email: clicking the “Update Now >” link
will take you to a fake Apple sign in page

The first fake Apple web page

If you enter your account details they are immediately sent to the scammer, however this is a two-stage scam, and once you have entered your Apple ID and password it will continue, taking you on to a second fake page where you are asked for further information including your credit card details.

The second fake Apple web page, seeking extra information

The fake website has been customised to specifically target Australian Apple ID account holders and features a number of design details tailored to lure Australians, such as a field requesting Medicare Card numbers and Australian flag  icons.

Some inconsistencies, such as the request for your “3D Secure” number or the placement of a Discover Credit Card logo (predominately US features), offer clues to suggest this is a fake page.
The most important indication that this is a scam is the assurance from Apple that they will not contact you seeking critical information via an unsolicited email.
If you need to log on to manage your Apple ID account or any other online service, source the website address independently of any such emails and type it directly into your browser.

Avoid  phishing  emails  

Always be suspicious of unsolicited emails.

Do not click links or open attachments unless you are confident about the sender and information the email contains. The best advice is to simply delete the email.

If you are uncertain about the origin of any email you can always cross check the information by going independently to the company’s website or by calling them directly.

Apple customers also have the option of activating two-factor authentication for their Apple account.

 

 

 

Source : www.staysmartonline.gov.au

Apple hit by hackers

Exploited Java flaw.

Apple was recently attacked by hackers who infected the Macs of some employees, in the widest known cyber attacks against Apple-made computers to date.

Unknown hackers infected the computers of some Apple workers when they visited a website for software developers that had been infected with malicious software. The malware had been designed to attack Mac computers, the company said in a statement.

The same software, which infected Macs by exploiting a flaw in a version of Oracle’s Java software used as a plug-in on web browsers, was used to launch attacks against Facebook this week.

The malware was also employed in attacks against Mac computers used by “other companies,” Apple said, without elaborating on the scale of the assault.

But a person briefed on the investigation into the attacks said that hundreds of companies, including defense contractors, had been infected with the same malicious software, or malware.

The attacks mark the highest-profile cyber attacks to date on businesses running Mac computers. Hackers have traditionally focused on attacking machines running the Windows operating system, though they have gradually turned their attention to Apple products over the past couple of years as the company gained market share over Microsoft.

“This is the first really big attack on Macs,” said the source, who declined to be identified. “Apple has more on its hands than the attack on itself.”

National security

Cyber-security attacks have been on the rise. In last week’s State of the Union address, US President Barack Obama issued an executive order seeking better protection of the country’s critical infrastructure from cyber attacks.

Over the weekend, cyber-security specialists Mandiant reported that a secretive Chinese military unit was believed to have orchestrated a series of attacks on US companies, which Beijing has strongly denied.

White House spokesman Jay Carney told reporters on Tuesday that the Obama administration has repeatedly taken up its concerns about Chinese cyber-theft with Beijing, including the country’s military. There was no indication as to whether the group described by Mandiant was involved in the attacks described by Apple and Facebook.

An Apple spokesman declined to specify how many companies had been breached in the campaign targeting Macs.

“Apple has identified malware which infected a limited number of Mac systems through a vulnerability in the Java plug-in for browsers. The malware was employed in an attack against Apple and other companies, and was spread through a website for software developers,” the statement said.

“We identified a small number of systems within Apple that were infected and isolated them from our network. There is no evidence that any data left Apple,” it continued.

The statement said Apple was working closely with law enforcement to find the culprits, but the spokesman would not elaborate. The Federal Bureau of Investigation declined to comment.

Apple said it plans to release a piece of software today, which it said customers can use to identify and repair Macs infected with the malware used in the attacks.

 

Source : http://www.crn.com.au/News/333756,apple-hit-by-hackers.aspx?eid=4&edate=20130220&utm_source=20130220&utm_medium=newsletter&utm_campaign=daily_newsletter

By Jim Finkle and Joseph Menn on Feb 20, 2013 8:03 AM (42 minutes ago)
Filed under Security

iOS 6.1: Excess Exchange activity after accepting an exception to recurring calendar event Products Affected iPad, iPhone

Symptoms

When you respond to an exception to a recurring calendar event with a Microsoft Exchange account on a device running iOS 6.1, the device may begin to generate excessive communication with Microsoft Exchange Server. You may notice increased network activity or reduced battery life on the iOS device. This extra network activity will be shown in the logs on Exchange Server and it may lead to the server blocking the iOS device. This can occur with iOS 6.1 and Microsoft Exchange 2010 SP1 or later, or Microsoft Exchange Online (Office365).

* An exception is a change to a single instance of a repeating calendar event.

Resolution

Apple has identified a fix and will make it available in an upcoming software update. In the meantime, you can avoid this bug by not responding to an exception to a recurring event on your iOS device. If you do experience the symptoms described above, disable then reenable the Exchange calendar on your iOS device using the steps below.

  1. Go to Settings > Mail, Contacts, Calendars
  2. Select the Exchange account from your Accounts list.
  3. Turn the switch for Calendars to OFF.
  4. Wait ten seconds.
  5. Turn the switch for Calendars back to ON.